Login / Signup
Applying security policies and service level agreement to IaaS service model to enhance security and transition.
Louay Karadsheh
Published in:
Comput. Secur. (2012)
Keyphrases
</>
security policies
security requirements
access control
real time
database
information systems
management system
context aware
service oriented
resource management
security management
rbac model